TY - GEN
T1 - Hardware Implementation of Analog Keyless Encapsulation Using Preformed ReRAM PUF
AU - Korenda, Ashwija Reddy
AU - Rios, Manuel Aguilar
AU - Cambou, Bertrand
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024
Y1 - 2024
N2 - With the advent of high performance computing, there has been an increase in attacks on key based encryption mechanisms, specifically Public key infrastructure (PKI), which are based on mathematical functions that are computationally infeasible in reverse, yet easy to compute in one direction. In addition, these mechanisms require efficient key distribution and storage in order to ensure that the encrypted message can be decrypted by the intended recipient. In order to mitigate such attacks, encryption mechanisms that do not require the use of keys are an attractive option. Physical unclonable Functions (PUFs) have become very popular in this aspect, where they allow key regeneration and mitigate the need for distribution and storage of keys. Through this research, the PUF-based mechanism is leveraged and further advanced by encrypting a message using the analog resistance values of a Resistive Random Access Memory (ReRAM) when a certain current is applied. An attacker would be unable to break the cipher without having the hardware physically available, thus allowing secure transmission of messages. During this study, we explored and understood the inter and intra hamming distances involved in decrypting messages using ReRAM PUF-based analog keyless encapsulation mechanisms. An individual cipher represents a symbol (collection of bits) with a range of 1 to 6 bits. The inter PUF error was found to be between 35–60% when 1 to 4 bits per symbol are utilized while keeping the intra hamming error 0–9%. This error was further reduced by 50% when gray code was implemented to represent each symbol. A zero decryption error can be achieved by implementing error-correcting codes like BCH, RS or LDPC to ensure efficient transmission without losing information. These codes utilize coding parameters to ensure all errors are corrected.
AB - With the advent of high performance computing, there has been an increase in attacks on key based encryption mechanisms, specifically Public key infrastructure (PKI), which are based on mathematical functions that are computationally infeasible in reverse, yet easy to compute in one direction. In addition, these mechanisms require efficient key distribution and storage in order to ensure that the encrypted message can be decrypted by the intended recipient. In order to mitigate such attacks, encryption mechanisms that do not require the use of keys are an attractive option. Physical unclonable Functions (PUFs) have become very popular in this aspect, where they allow key regeneration and mitigate the need for distribution and storage of keys. Through this research, the PUF-based mechanism is leveraged and further advanced by encrypting a message using the analog resistance values of a Resistive Random Access Memory (ReRAM) when a certain current is applied. An attacker would be unable to break the cipher without having the hardware physically available, thus allowing secure transmission of messages. During this study, we explored and understood the inter and intra hamming distances involved in decrypting messages using ReRAM PUF-based analog keyless encapsulation mechanisms. An individual cipher represents a symbol (collection of bits) with a range of 1 to 6 bits. The inter PUF error was found to be between 35–60% when 1 to 4 bits per symbol are utilized while keeping the intra hamming error 0–9%. This error was further reduced by 50% when gray code was implemented to represent each symbol. A zero decryption error can be achieved by implementing error-correcting codes like BCH, RS or LDPC to ensure efficient transmission without losing information. These codes utilize coding parameters to ensure all errors are corrected.
KW - Analog key encapsulation
KW - BCH
KW - Hardware encryption
KW - LDPC
KW - Physical unclonable function
KW - Resistive random access memory
UR - http://www.scopus.com/inward/record.url?scp=85209545308&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85209545308&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-73128-0_20
DO - 10.1007/978-3-031-73128-0_20
M3 - Conference contribution
AN - SCOPUS:85209545308
SN - 9783031731273
T3 - Lecture Notes in Networks and Systems
SP - 332
EP - 352
BT - Proceedings of the Future Technologies Conference (FTC) 2024
A2 - Arai, Kohei
PB - Springer Science and Business Media Deutschland GmbH
T2 - 9th Future Technologies Conference, FTC 2024
Y2 - 14 November 2024 through 15 November 2024
ER -